CompTIA Network+ | Microsoft MTA Networking: Methods of User Authentication

Posted by & filed under CompTIA Network+, MICROSOFT MTA NETWORKING.

User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity; the term contrasts with machine authentication, which involves automated processes that do not require user input. Source mc mcse Certification Resources PKI (Public Key Infrastructure) – A public key infrastructure (PKI) is the combination of software,… Read more »

Cisco CCNA Router on Stick

Posted by & filed under Cisco CCNA.

Router on stick

Follow @ASM_Educational Cisco CCNA-Router on Stick Inter VLAN Communication (Router on Stick) Earlier we built and tested the following topology:

CISSP LANs and Their Components

Posted by & filed under CISSP.

A local area network (LAN) is a critical component of a modern data network. A LAN is comprised of one or more computers, a communication protocol, a network topology, and cabling or a wireless network to connect the systems.

CISSP System Validation

Posted by & filed under CISSP.

No system or architecture will ever be completely secure; there will always be a certain level of risk.

CISSP Security Models of Control

Posted by & filed under CISSP.

Security Models of Control Security models of control are used to determine how security will be implemented, what subjects can access the system, and what objects they will have access to. Simply stated, they are a way to formalize security policy.

CISSP Security Mechanisms

Posted by & filed under CISSP.

Although a robust architecture is a good start, real security requires that you have security mechanisms in place to control processes and applications. Some good security mechanisms are described in the following sections.

CISSP Penetration Testing

Posted by & filed under CISSP.

  Penetration testing is a series of activities undertaken to identify and exploit security vulnerabilities.